By David Salomon
Covering classical cryptography, glossy cryptography, and steganography, this quantity information how facts will be stored safe and personal. every one subject is gifted and defined through describing quite a few tools, concepts, and algorithms. furthermore, there are various priceless examples to enhance the reader's figuring out and services with those innovations and methodologies.
Features & Benefits:
* accommodates either info encryption and information hiding
* provides a wealth of workouts and strategies to assist readers effortlessly comprehend the material
* provides details in an available, nonmathematical style
* Concentrates on particular methodologies that readers can make a choice from and pursue, for his or her data-security wishes and goals
* Describes new themes, akin to the complicated encryption commonplace (Rijndael), quantum cryptography, and elliptic-curve cryptography.
The publication, with its available variety, is a necessary spouse for all defense practitioners and execs who have to comprehend and successfully use either info hiding and encryption to guard electronic facts and communications. it's also appropriate for self-study within the components of programming, software program engineering, and security.
Read or Download Data Privacy and Security: Encryption and Information Hiding (Springer Professional Computing) PDF
Similar computer information theory books
The imaginative and prescient of ubiquitous computing and ambient intelligence describes an international of know-how that's current wherever, every time within the type of shrewdpermanent, good units that speak with one another and supply custom-made companies. despite the fact that, open interconnected structures are even more at risk of assaults and unauthorized facts entry.
Is wisdom an fiscal stable? that are the features of the associations regulating the construction and diffusion of data? Cumulation of information is a key determinant of monetary development, yet only in the near past wisdom has moved to the middle of financial research. fresh literature additionally provides profound insights into occasions like medical growth, creative and craft improvement which were infrequently addressed as socio-economic associations, being the area of sociologists and historians instead of economists.
An advent to utilized optimum keep an eye on
This easy-to-read consultant offers a concise advent to the engineering heritage of recent conversation platforms, from cellphones to facts compression and garage. history arithmetic and particular engineering suggestions are saved to a minimal in order that just a uncomplicated wisdom of high-school arithmetic is required to appreciate the fabric lined.
- Information Theoretic Security: 7th International Conference, ICITS 2013, Singapore, November 28-30, 2013, Proceedings (Lecture Notes in Computer Science)
- Cryptographic Protocol: Security Analysis Based on Trusted Freshness
- Formal Languages and Computation: Models and Their Applications
- Five Pillars of Knowledge, Information and Data Management
- Pro SQL Server 2012 BI Solutions (Expert's Voice in SQL Server)
- Content-Based Video Retrieval: A Database Perspective (Multimedia Systems and Applications)
Additional resources for Data Privacy and Security: Encryption and Information Hiding (Springer Professional Computing)